• Title/Summary/Keyword: CPA방법

Search Result 65, Processing Time 0.022 seconds

Non-Profiling Power Analysis Attacks Using Continuous Wavelet Transform Method (연속 웨이블릿 변환을 사용한 비프로파일링 기반 전력 분석 공격)

  • Bae, Daehyeon;Lee, Jaewook;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.6
    • /
    • pp.1127-1136
    • /
    • 2021
  • In the field of power analysis attacks, electrical noise and misalignment of the power consumption trace are the major factors that determine the success of the attack. Therefore, several studies have been conducted to overcome this problem, and one of them is a signal processing method based on wavelet transform. Up to now, discrete wavelet transform, which can compress the trace, has been mostly used for power side-channel power analysis because continuous wavelet transform techniques increase data size and analysis time, and there is no efficient scale selection method. In this paper, we propose an efficient scale selection method optimized for power analysis attacks. Furthermore, we show that the analysis performance can be greatly improved when using the proposed method. As a result of the CPA(Correlation Power Analysis) and DDLA(Differential Deep Learning Analysis) experiments, which are non-profiling attacks, we confirmed that the proposed method is effective for noise reduction and trace alignment.

Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis (부채널 분석 대응을 위한 1차 마스킹 AES 알고리즘 최적화 구현)

  • Kim, Kyung Ho;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.225-230
    • /
    • 2019
  • Recently, with the development of Internet technology, various encryption algorithms have been adopted to protect the sensing data measured by hardware devices. The Advanced Encryption Standard (AES), the most widely used encryption algorithm in the world, is also used in many devices with strong security. However, it has been found that the AES algorithm is vulnerable to side channel analysis attacks such as Differential Power Analysis (DPA) and Correlation Power Analysis (CPA). In this paper, we present a software optimization implementation technique of the AES algorithm applying the most widely known masking technique among side channel analysis attack methods.

Countermeasure Techniques Analysis for Power Analysis Attack (전력분석공격에 대한 대응기술 분석)

  • Kang, Young-Jin;Jo, Jung-Bok;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.221-223
    • /
    • 2014
  • Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of side channel attack which allow an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms or leaked informations from physical implementation of a cryptosystem are usually used to break the system. This paper describes how power analysis work and we provide an overview of countermeasures against power analysis attacks.

  • PDF

The Lung Expression of Proinflammatory Cytokines, TNF-$\alpha$ and Interleukin 6, in Early Periods of Endotoxemia (내독소혈증 유발 급성폐손상에서 폐장내 Proinflammatory Cytokines 발현에 관한 고찰)

  • Moon, Seung-Hyug;Kim, Yong-Hoon;Park, Choon-Sik;Lee, Shin-Je
    • Tuberculosis and Respiratory Diseases
    • /
    • v.45 no.3
    • /
    • pp.553-564
    • /
    • 1998
  • Background: The immediate hoot response to LPS is the production of proinflammatory cytokines that act as intercellular mediators in inflammatory reactions, including acute lung injury. These "early response" cytokines transmit signals from recognition cells to target or effector cells. This host response is further amplified by the expression of leukocyte chemoattractants, growth factors, and adhesion molecules, resulting in an array of proinflammatory events. This experiment was performed to define the lung origin of proinflammatory cytokines, such as TNF-$\alpha$, IL 6 in early periods of endotoxin induced acute lung injury (ALI). Method: The healthy male Sprague-Dawley, weighted 150 - 250g, were divided into saline control (NC) and endotoxemia-induced ALI (ETX-), and leukopenic endotoxemia-induced ALI (CPA-ETX-Group) which was induced by cyclophosphamide, 70 mg/kg i.p. injection. Acute lung injury was evoked by LPS, 5 mg/kg, intravenously administered. Bronchoalveolar lavage was performed at 0, 3, 6 h after LPS-treated to estimate the influx of phagocytes and concentration of total protein, and cytokines as TNF-$\alpha$ and IL 6 by a bioassy using MIT method. We also examined the localization of TNF-$\alpha$ and IL 6 protein in endotoxemia-challenged lung tissue by immunohistochemical stain (IH). Results: The total cell, macrophage and PMN count in BALF were elavated in ETX group compared to NC(p<0.05). In CPA-ETX group, total cell and macrophage count in BALF were not changed compared to NC. but PMN count was markedly reduced and it took part in less than 0.1 % of total BAL cells (p<0.01). The protein concentration in BALF were significantly increased in ETX and CPA-ETX group Compared to NC (p<0.05), but there was significant difference between ETX- and CPA-ETX group only at 6 h (p<0.05). This observation suggested that even if PMNs are involved in the pathogenesis of acute lung injury, their role cannot be viewed as essential The concentration of TNF-$\alpha$ and IL 6 in BALF was significantly increased in the ETX- and CPA-ETX group compared to NC. There was no difference between ETX- and CPA-ETX group. In IH, anti-TNF-$\alpha$- and anti-IL 6 antibody was strongly localized at interstitial monocytes and alveolar macrophages in endotoxemia-challenged lung tissue. From above point of view, activated alveolar macrophage/monocyte considered as a prominent source of proinflammatory cytokines in endotoxemia-challenged lung injury. Conclusion: The prominent source of proinflammatory cytokines in early periods of endotoxemia-induced lung injury will be the activated resident macrophages like an alveolar macrophage and interstitial monocytes. The pulmonary macrophage/monocyte will impact the initiation and continuance of lung injury without PMNs's certain inflammatory role, particularly in endotoxemia-induced acute lung injury.

  • PDF

Balanced valuation and management initiatives (균형가치평가와 경영권 방어)

  • Lim, Deuk-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2002.06a
    • /
    • pp.8-13
    • /
    • 2002
  • 기업의 가치평가방법은 DCF법을 비롯하여 OPM, 증권거래법에 의한 본질가치평가방법, 상속세법에 의한 재산가치평가방법, 비교법, 일정성장배당모형 등 여러가지가 있다. 이중 각 평가방법은 특정한 목적을 가지고 탄생된 것이나 영리를 위한 기업의 가치를 평가하여 그 결과를 M&A나 A&D 또는 경영의 지표로 이용하려할 때 그 편파성 때문에 목적을 달성하기 어렵다. 따라서 본고에서는 그들의 균형을 취하는 평가방법을 알아보고, 장기적인 차원에서의 경영을 전제로 벤처기업자금조달과 맞물려있는 경영권 방어에 대하여 살피므로써 벤처기업인들이 안정적인 경영을 수행하거나 창업초기에 일찍 경영에 대한 분명한 목표를 설정하고 자신의 역량을 생산적인 곳에 사용할 수 있게 할 수 있는 틀을 제시해 본다.

  • PDF

High Speed Modular Multiplication Algorithm for RSA Cryptosystem (RSA 암호 시스템을 위한 고속 모듈라 곱셈 알고리즘)

  • 조군식;조준동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3C
    • /
    • pp.256-262
    • /
    • 2002
  • This paper presents a novel radix-4 modular multiplication algorithm based on the sign estimation technique (3). The sign estimation technique detects the sign of a number represented in the form of a carry-sum pair. It can be implemented with 5-bit carry look-ahead adder. The hardware speed of the cryptosystem is dependent on the performance modular multiplication of large numbers. Our algorithm requires only (n/2+3) clock cycle for n bit modulus in performing modular multiplication. Our algorithm out-performs existing algorithm in terms of required clock cycles by a half, It is efficient for modular exponentiation with large modulus used in RSA cryptosystem. Also, we use high-speed adder (7) instead of CPA (Carry Propagation Adder) for modular multiplication hardware performance in fecal stage of CSA (Carry Save Adder) output. We apply RL (Right-and-Left) binary method for modular exponentiation because the number of clock cycles required to complete the modular exponentiation takes n cycles. Thus, One 1024-bit RSA operation can be done after n(n/2+3) clock cycles.

Image Classification Method using Independent Component Analysis and Normalization (독립성분해석과 정규화를 이용한 영상분류 방법)

  • Hong, Jun-Sik;Ryu, Jeong-Woong
    • Journal of KIISE:Software and Applications
    • /
    • v.28 no.9
    • /
    • pp.629-633
    • /
    • 2001
  • In this paper, we improve noise tolerance in image classification by combining ICA(Independent Component Analysis) with Normalization. When we add noise to the raw image data the degree of noise tolerance becomes N(0, 0.4) for PCA and N(0, 0.53) for ICA. However, when we use the preprocessing approach the degree of noise tolerance after Normalization becomes N(0, 0.75), which shows the improvement of noise tolerance in classification.

  • PDF

A New Approach to the Evaluation of Collision Risk using Sech Function (Sech 함수를 이용한 새로운 충돌위험도 평가법)

  • Jeong, Tae-Gweon
    • Journal of Navigation and Port Research
    • /
    • v.27 no.2
    • /
    • pp.103-109
    • /
    • 2003
  • Evaluating the risk of collision quantitatively plays a key role in developing the expert system of navigation and collision avoidance. This study analysed the existing methods of appraising the collision risk, examined the problem that are intrinsic to them, and developed a new approach to its evaluation by using the sech function as an alternative to them. This paper applied the new method in appraising the collision risk and suggested how to decide the safe range of ownship's action.

The Effect of Repeated Mariner Training Using a Ship-Handling Simulator System on Ship Control (선박조종시뮬레이터를 이용한 반복 항해 훈련이 선박 조종에 미치는 영향)

  • Lee Jae-Sik;Lee Joon-Bum;Oh Jin-Seok
    • Journal of Navigation and Port Research
    • /
    • v.30 no.6 s.112
    • /
    • pp.427-432
    • /
    • 2006
  • The purpose of the present study was to investigate the effect of mariner's situation awareness(SA) training on navigation performance using a full mission ship-handling simulator. For this purpose, the mariners were trained in terms of various aspects of SA. Independent variables such as risk levels of ship-to-ship collision, navigational route types of 'target ship(TS)', and number of ships around the own ship(OS) were systematically varied, and dependent variables of closest point of approach(CPA) between TS and OS, number of collision, types of collision-avoidance strategy were measured The results can be summarized as followings. First, training on mariner's SA appeared to induce improved performances in various aspects of ship handling. Second, mariners in the routine navigation situation where TS had priority following maritime rules seemed to suffer to prepare collision avoidance when the TS altered its route. However, this tendency greatly reduced after the training These results suggest the benefit of mariner's SA training on maritime safety.

A Study on the Degree of Collision Risk through Analysing the Risk Attitude of Vessel Traffic Service Operators (해상교통관제사의 위험태도 분석을 통한 선박 충돌 위험도 연구)

  • Lee, Jin-Suk;Song, Chae-Uk
    • Journal of Navigation and Port Research
    • /
    • v.41 no.3
    • /
    • pp.93-102
    • /
    • 2017
  • When VTSOs (Vessel Traffic Service Operator) determine the degree of collision risk for two vessels, they consider comprehensive information about each vessel's course, speed, DCPA, TCPA, and encountering situation. In this study, we proposed a utility function based on the risk attitudes of VTSOs toward the Risk Index (RI). The RI was calculated using the risk of encounter, the risk of approach, and the risk of time for two vessels in order to predict each ship's collision risk from the VTS viewpoint. We obtained each coefficient of the RI and the risk attitude through a survey of collision risks among VTSOs of Korea. In order to verify whether the proposed utility is reasonable, we validated by applying the degree of collision risk to some historical cases of accidents in Busan port along with the Ship of ES value($ES_S$) of ES(Environmental Stress) model.